summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorhin <hin@openbsd.org>2002-06-06 00:37:36 +0000
committerhin <hin@openbsd.org>2002-06-06 00:37:36 +0000
commit48fbc2e4cc6750c319871bb6dc8803f03a06fdcc (patch)
tree76c5acaf68ac51f8850dc8083c2725b8618e2afb
parentzap (diff)
downloadwireguard-openbsd-48fbc2e4cc6750c319871bb6dc8803f03a06fdcc.tar.xz
wireguard-openbsd-48fbc2e4cc6750c319871bb6dc8803f03a06fdcc.zip
-Wall -Werror sweep on i386.
-rw-r--r--kerberosV/src/kdc/kaserver.c5
-rw-r--r--kerberosV/src/kdc/kerberos4.c4
-rw-r--r--kerberosV/src/kuser/kinit.c2
-rw-r--r--kerberosV/src/lib/kadm5/ipropd_master.c1
-rw-r--r--kerberosV/src/lib/kadm5/ipropd_slave.c1
-rw-r--r--kerberosV/src/lib/krb5/crypto.c21
-rw-r--r--kerberosV/src/lib/krb5/init_creds.c10
-rw-r--r--kerberosV/src/lib/roken/resolve.c1
8 files changed, 24 insertions, 21 deletions
diff --git a/kerberosV/src/kdc/kaserver.c b/kerberosV/src/kdc/kaserver.c
index a59138b97c0..be739c2b7b0 100644
--- a/kerberosV/src/kdc/kaserver.c
+++ b/kerberosV/src/kdc/kaserver.c
@@ -259,11 +259,12 @@ create_reply_ticket (struct rx_header *hdr,
struct rx_header reply_hdr;
des_cblock zero;
size_t pad;
- unsigned fyrtiosjuelva;
+ unsigned fyrtiosjuelva; /* XXX better variable name
+ (this means 4711 in swedish. not kidding */
/* create the ticket */
- des_new_random_key(&session);
+ des_new_random_key((unsigned char *)&session);
krb_create_ticket (&ticket, 0, name, instance, realm,
addr->sin_addr.s_addr,
diff --git a/kerberosV/src/kdc/kerberos4.c b/kerberosV/src/kdc/kerberos4.c
index b3f05c68219..2da37685ab7 100644
--- a/kerberosV/src/kdc/kerberos4.c
+++ b/kerberosV/src/kdc/kerberos4.c
@@ -318,7 +318,7 @@ do_version4(unsigned char *buf,
KTEXT r;
des_cblock session;
- des_new_random_key(&session);
+ des_new_random_key((unsigned char *)&session);
krb_create_ticket(&ticket, 0, name, inst, v4_realm,
addr->sin_addr.s_addr, session, life, kdc_time,
@@ -493,7 +493,7 @@ do_version4(unsigned char *buf,
KTEXT_ST cipher, ticket;
KTEXT r;
des_cblock session;
- des_new_random_key(&session);
+ des_new_random_key((unsigned char *)&session);
krb_create_ticket(&ticket, 0, ad.pname, ad.pinst, ad.prealm,
addr->sin_addr.s_addr, &session, life, kdc_time,
sname, sinst, skey->key.keyvalue.data);
diff --git a/kerberosV/src/kuser/kinit.c b/kerberosV/src/kuser/kinit.c
index aefac52560e..e286c6cfd0e 100644
--- a/kerberosV/src/kuser/kinit.c
+++ b/kerberosV/src/kuser/kinit.c
@@ -618,7 +618,7 @@ main (int argc, char **argv)
#ifdef KRB4
if(get_v4_tgt == -1)
krb5_appdefault_boolean(context, "kinit",
- krb5_principal_get_realm(context, principal),
+ (krb5_realm)krb5_principal_get_realm(context, principal),
"krb4_get_tickets", TRUE, &get_v4_tgt);
#endif
diff --git a/kerberosV/src/lib/kadm5/ipropd_master.c b/kerberosV/src/lib/kadm5/ipropd_master.c
index 041d992a994..97a6f71e3dd 100644
--- a/kerberosV/src/lib/kadm5/ipropd_master.c
+++ b/kerberosV/src/lib/kadm5/ipropd_master.c
@@ -32,6 +32,7 @@
*/
#include "iprop.h"
+#include <util.h>
RCSID("$KTH: ipropd_master.c,v 1.23 2001/08/30 15:15:50 nectar Exp $");
diff --git a/kerberosV/src/lib/kadm5/ipropd_slave.c b/kerberosV/src/lib/kadm5/ipropd_slave.c
index 852d976f7f3..b4801669350 100644
--- a/kerberosV/src/lib/kadm5/ipropd_slave.c
+++ b/kerberosV/src/lib/kadm5/ipropd_slave.c
@@ -32,6 +32,7 @@
*/
#include "iprop.h"
+#include <util.h>
RCSID("$KTH: ipropd_slave.c,v 1.24 2001/08/31 03:12:17 assar Exp $");
diff --git a/kerberosV/src/lib/krb5/crypto.c b/kerberosV/src/lib/krb5/crypto.c
index 65b5757eddf..017142551cf 100644
--- a/kerberosV/src/lib/krb5/crypto.c
+++ b/kerberosV/src/lib/krb5/crypto.c
@@ -248,12 +248,12 @@ DES_AFS3_Transarc_string_to_key (krb5_data pw,
memcpy(&temp_key, "kerberos", 8);
des_set_odd_parity (&temp_key);
des_set_key (&temp_key, schedule);
- des_cbc_cksum (password, &ivec, passlen, schedule, &ivec);
+ des_cbc_cksum ((des_cblock *)password, &ivec, passlen, schedule, &ivec);
memcpy(&temp_key, &ivec, 8);
des_set_odd_parity (&temp_key);
des_set_key (&temp_key, schedule);
- des_cbc_cksum (password, key, passlen, schedule, &ivec);
+ des_cbc_cksum ((des_cblock *)password, key, passlen, schedule, &ivec);
memset(&schedule, 0, sizeof(schedule));
memset(&temp_key, 0, sizeof(temp_key));
memset(&ivec, 0, sizeof(ivec));
@@ -359,8 +359,9 @@ DES3_string_to_key(krb5_context context,
des_set_key(keys + i, s[i]);
}
memset(&ivec, 0, sizeof(ivec));
- des_ede3_cbc_encrypt(tmp, tmp, sizeof(tmp),
- s[0], s[1], s[2], &ivec, DES_ENCRYPT);
+ des_ede3_cbc_encrypt((des_cblock *)tmp, (des_cblock *)tmp,
+ sizeof(tmp), s[0], s[1], s[2], &ivec,
+ DES_ENCRYPT);
memset(s, 0, sizeof(s));
memset(&ivec, 0, sizeof(ivec));
for(i = 0; i < 3; i++){
@@ -894,8 +895,8 @@ RSA_MD4_DES_checksum(krb5_context context,
MD4_Update (&md4, data, len);
MD4_Final (p + 8, &md4);
memset (&ivec, 0, sizeof(ivec));
- des_cbc_encrypt(p,
- p,
+ des_cbc_encrypt((des_cblock *)p,
+ (des_cblock *)p,
24,
key->schedule->data,
&ivec,
@@ -969,8 +970,8 @@ RSA_MD5_DES_checksum(krb5_context context,
MD5_Update (&md5, data, len);
MD5_Final (p + 8, &md5);
memset (&ivec, 0, sizeof(ivec));
- des_cbc_encrypt(p,
- p,
+ des_cbc_encrypt((des_cblock *)p,
+ (des_cblock *)p,
24,
key->schedule->data,
&ivec,
@@ -1031,8 +1032,8 @@ RSA_MD5_DES3_checksum(krb5_context context,
MD5_Update (&md5, data, len);
MD5_Final (p + 8, &md5);
memset (&ivec, 0, sizeof(ivec));
- des_ede3_cbc_encrypt(p,
- p,
+ des_ede3_cbc_encrypt((des_cblock *)p,
+ (des_cblock *)p,
24,
sched[0], sched[1], sched[2],
&ivec,
diff --git a/kerberosV/src/lib/krb5/init_creds.c b/kerberosV/src/lib/krb5/init_creds.c
index f66e694f6e8..7478dd149cf 100644
--- a/kerberosV/src/lib/krb5/init_creds.c
+++ b/kerberosV/src/lib/krb5/init_creds.c
@@ -103,26 +103,26 @@ krb5_get_init_creds_opt_set_default_flags(krb5_context context,
time_t t;
b = get_config_bool (context, realm, "forwardable");
- krb5_appdefault_boolean(context, appname, realm, "forwardable", b, &b);
+ krb5_appdefault_boolean(context, appname, (krb5_realm)realm, "forwardable", b, &b);
krb5_get_init_creds_opt_set_forwardable(opt, b);
b = get_config_bool (context, realm, "proxiable");
- krb5_appdefault_boolean(context, appname, realm, "proxiable", b, &b);
+ krb5_appdefault_boolean(context, appname, (krb5_realm)realm, "proxiable", b, &b);
krb5_get_init_creds_opt_set_proxiable (opt, b);
- krb5_appdefault_time(context, appname, realm, "ticket_lifetime", 0, &t);
+ krb5_appdefault_time(context, appname, (krb5_realm)realm, "ticket_lifetime", 0, &t);
if (t == 0)
t = get_config_time (context, realm, "ticket_lifetime", 0);
if(t != 0)
krb5_get_init_creds_opt_set_tkt_life(opt, t);
- krb5_appdefault_time(context, appname, realm, "renew_lifetime", 0, &t);
+ krb5_appdefault_time(context, appname, (krb5_realm)realm, "renew_lifetime", 0, &t);
if (t == 0)
t = get_config_time (context, realm, "renew_lifetime", 0);
if(t != 0)
krb5_get_init_creds_opt_set_renew_life(opt, t);
- krb5_appdefault_boolean(context, appname, realm, "no-addresses", FALSE, &b);
+ krb5_appdefault_boolean(context, appname, (krb5_realm)realm, "no-addresses", FALSE, &b);
if (b)
krb5_get_init_creds_opt_set_address_list (opt, &no_addrs);
diff --git a/kerberosV/src/lib/roken/resolve.c b/kerberosV/src/lib/roken/resolve.c
index d2f5fd5ff99..7d93caff61b 100644
--- a/kerberosV/src/lib/roken/resolve.c
+++ b/kerberosV/src/lib/roken/resolve.c
@@ -481,7 +481,6 @@ dns_free_data(struct dns_reply *r)
void
dns_srv_order(struct dns_reply *r)
{
- return 0;
}
#endif